You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by jo...@apache.org on 2014/07/14 23:31:09 UTC
svn commit: r1610541 -
/httpd/site/trunk/content/security/vulnerabilities-httpd.xml
Author: jorton
Date: Mon Jul 14 21:31:09 2014
New Revision: 1610541
URL: http://svn.apache.org/r1610541
Log:
Add CVE-2014-0118, CVE-2014-0226, thanks to Mark for doing most of the work here.
Modified:
httpd/site/trunk/content/security/vulnerabilities-httpd.xml
Modified: httpd/site/trunk/content/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/vulnerabilities-httpd.xml?rev=1610541&r1=1610540&r2=1610541&view=diff
==============================================================================
--- httpd/site/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/content/security/vulnerabilities-httpd.xml Mon Jul 14 21:31:09 2014
@@ -1,4 +1,51 @@
-<security updated="20140326">
+<security updated="20140714">
+
+<issue fixed="2.4.10-dev" reported="20140219" public="20140714" released="20140714">
+<cve name="CVE-2014-0118"/>
+<severity level="3">moderate</severity>
+<title>mod_deflate denial of service</title>
+<description><p>
+A resource consumption flaw was found in mod_deflate. If request body
+decompression was configured (using the "DEFLATE" input filter), a
+remote attacker could cause the server to consume significant memory
+and/or CPU resources. The use of request body decompression is not a common
+configuration.
+</p></description>
+<acknowledgements>
+This issue was reported by Giancarlo Pellegrino and Davide Balzarotti
+</acknowledgements>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
+
+<issue fixed="2.4.10-dev" reported="20140530" public="20140714" released="20140714">
+<cve name="CVE-2014-0226"/>
+<severity level="3">moderate</severity>
+<title>mod_status buffer overflow</title>
+<description><p>
+A race condition was found in mod_status. An attacker able to access
+a public server status page on a server using a threaded MPM could send a carefully crafted
+request which could lead to a heap buffer overflow. Note that it is not a default
+or recommended configuration to have a public accessible server status page.
+</p></description>
+<acknowledgements>
+This issue was reported by Marek Kroemeke via HP ZDI
+</acknowledgements>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
<issue fixed="2.4.7" reported="20130914" public="20140714" released="20131126">
<cve name="CVE-2013-4352"/>